Chris Konrad

Chris Konrad

Practice Lead, Security Engagements

Chris Konrad is the global practice lead for security engagements at WWT. Chris brings more than 20 years of experience in IT, security, privacy, information risk management, vendor management and regulatory compliance. He provides leadership for the WWT global cybersecurity practice and works closely with the global business development, sales and professional services stakeholders to develop and execute a go-to-market strategy for cybersecurity.

Q&A with Chris Konrad

Tell us about your background and how you got into technology.

In 1989, instead of becoming a physical education teacher, I decided to work for The Technology Factory, a subsidiary of Pioneer Technologies, who at the time was one of the largest Digital Equipment Corporation distributors. I started in the warehouse and soon became a manager responsible for millions of dollars worth of inventory that consisted of PC’s, disk drives and modems. I quickly moved to telesales where I began to make technology into a career. I have over two decades of experience in various disciplines including developing information security services, growth strategies, sales, business development, strategic alliances, managing strategic client relationships, project management, income contributions, talent recruitment, mentoring and thought leadership.

What is your role at WWT?

As the global practice lead for security engagements, I provide leadership for the WWT global cybersecurity practice. I work closely with the global business development, sales and professional services stakeholders to develop and execute a go-to-market strategy for cybersecurity. I provide continuous mentoring, coaching and thought leadership for the WWT cybersecurity engineers, architects and principal consultants and I am responsible for helping ensure client satisfaction for all cybersecurity projects.

What innovation is happening in cybersecurity that has you really excited?

The threat landscape of cybersecurity is ever changing and keeps my job interesting. Whether its new malware or standards, regulations or frameworks being developed, there is always something new to introduce to customers to get them thinking more strategically about what level of risk they are operating at.

Describe a recent interaction with a customer that led to solving a problem.

Recently, I discovered a client was experiencing significant turnover in staff and had not conducted a risk assessment of their environment. I suggested an assessment take place with an overall objective to identify and analyze possible vulnerabilities that may be exploited by malicious persons or activities solely from a technological standpoint. Successful exploitation of identified vulnerabilities may lead to unauthorized access to and interruption, interception, modification, or fabrication of client and/or corporate data. I provided a document that outlined risks, recommendations and an overall roadmap to start reducing risk in their environment.

Want to know more? Check out our 37 Questions with a WWT Expert video series where Chris discusses how customers have used our ATC to test security solutions, offers best practices to protect against breaches and reveals three items on his bucket list.

A better security posture doesn’t always mean investing in the latest technology. Whether you’re a CISO or security engineer, the new year is the perfect time to inspect and optimize the tools you already have at your disposal.

If you are serious about protecting the confidentiality, integrity and availability of your organization's information, you need to assign the right people to the right job and use the right reporting structure.

Many resolutions for people are personal, but we can’t forget about what we need to do this year to keep our organizations safe. Read about some cybersecurity resolutions we need to make and keep this year.

Vulnerability assessments are often confused with penetration testing and used interchangeably, but they could not be more different. Read about the differences and which is best for your organization.

Somebody who has to manage an information security (INFOSEC) program these days has more than an enough to deal with. Read about four simple questions every cybersecurity manager should start asking to meet ever-changing compliance and regulatory demands.

Big data initiatives must be carefully architected. Without the right security policies, procedures, standards, guidelines, other IT controls and encryption solutions in place, big data can mean big risks.

Cyber attackers are lurking the Internet in search of information about you for the purposes of identity theft or access to your company's business assets. It’s called social engineering, and there are many techniques.